> Technology > Security > Internet Security

Internet Security

Computer Security is a highly complex field, and it is relatively immature, except on certain very secure systems that never make it into the news media because nothing ever goes wrong that can be publicized, and for which there is not much literature because the security details are proprietary. The ever-greater amounts of money dependent on electronic information make protecting it a growing industry and an active research topic.
Results 301 - 325 of 758Sort Results By: Published Date | Title | Company Name
White Paper Published By: McAfee     Published Date: Feb 06, 2013
Today’s threats to endpoints and data are more complex, more numerous, more varied —and changing every second. McAfee understands next-generation security in the context of your devices, additional protection technologies, and central management.
Tags : 
endpoint security, mac security, linux security, real time security, anti malware protection
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
The move towards multi-faceted protection has been gathering pace, with more technologies coming into play to protect users from the vast and increasing number of threats.
Tags : 
anti malware performance test, security performance test, application control benchmark, anti virus benchmark, hips benchmark
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
Change control processes are often reactive and require manual responses, an ineffective approach to combating today’s threats and handling the growing number of devices in the IT infrastructure.
Tags : 
anti spam, anti spyware, anti virus, application security, internet security
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
Today’s anti-malware solutions running as applications above the operating system are no match for the stealth techniques used by today’s malware developers. Hardware-assisted security products take advantage of a “deeper” security footprint.
Tags : 
advanced persistent threats, apts, apt attacks, rootkits, zero-day stealth attacks
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
Monitor memory operations in real time, and stop unknown, zero-day infections before they have a chance to do damage.
Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
Protecting the valuable and confidential information stored within databases is vital for maintaining the integrity and reputation of organizations everywhere, and for ensuring regulatory compliance.
Tags : 
vulnerability management, database security, dbms security, database activity monitoring, virtual patching
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
This white paper published by independent security research firm, Securosis takes a brutally candid look at triggers for considering a new security management platform, walking through each aspect of the decision, and presenting a process to migrate.
Tags : 
security management platform, siem, log management, security management 2.0, anti spam
    
McAfee
Case Study Published By: McAfee     Published Date: Feb 06, 2013
This survey shows how organizations leverage strategic risk management and mitigation solutions such as risk analysis, security information event management (SIEM), and vulnerability scanning as part of their overall risk and compliance programs.
Tags : 
risk and compliance, patch management, siem, policy compliance and configuration, database security
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
Read about the top five issues McAfee customers face with security information and event management (SIEM) and see corresponding use cases and customer case studies.
Tags : 
big security data, siem, mcafee global threat intelligence, mcafee gti, mcafee risk advisor
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
Integrating SIEM and threat intelligence to mitigate bad actors is essential for having a resilient security posture. The McAfee response is to expand the Security Connected framework by pairing McAfee SIEM and McAfee Global Threat Intelligence.
Tags : 
threat intelligence, bad actors, siem, mcafee global threat intelligence, mcafee gti
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
This paper explores the subject of continuous compliance versus audit-driven compliance, as well as how an ongoing approach to compliance makes compliance a positive force for securing data and systems.
Tags : 
continuous compliance, siem, continuous pci dss 2.0, fisma, security monitoring
    
McAfee
White Paper Published By: Symantec     Published Date: Jan 31, 2013
Read this comparison test to find out which antivirus Protection product is right for you.
Tags : 
antivirus, endpoint, protection, security, test
    
Symantec
White Paper Published By: Symantec     Published Date: Jan 31, 2013
AV-Test performed a comparative review of 7 enterprise endpoint security products to determine their real-world protection and remediation capabilities. Download the report to find out how each of the security solutions performed.
Tags : 
endpoint protection, security, performance test, comparison, access control
    
Symantec
White Paper Published By: Symantec     Published Date: Jan 31, 2013
PassMark Software conducted objective performance testing on Windows Defender and Symantec Endpoint Protection, on Windows 8 in August 2012. Read this comparison report for detailed results from performance tests.
Tags : 
endpoint protection, security, performance test, comparison, windows 8
    
Symantec
White Paper Published By: McAfee     Published Date: Jan 28, 2013
Re-think your DLP — This white paper discusses how a new DLP model aligns data discovery, classification, policy management, and security controls to your business requirements and processes.
Tags : 
dlp, business-centric dlp, dlp business rules, discovery, classification
    
McAfee
White Paper Published By: HP - Enterprise     Published Date: Jan 24, 2013
The trend toward consumerization in IT has strained the processes and governance put in place to ensure application security. It takes proven best practices to mitigate risk and embrace mobility without trepidation.
Tags : 
mobile, vulnerability, byod, dast, sast
    
HP - Enterprise
White Paper Published By: HP - Enterprise     Published Date: Jan 24, 2013
This report details the current state of the security management market and what to expect moving forward.
Tags : 
security, testing, security controls, security management, tools
    
HP - Enterprise
White Paper Published By: HP - Enterprise     Published Date: Jan 24, 2013
Business today is driven by a global economy that generates an unprecedented volume, variety, and velocity of data. Security needs to adapt to a world that’s evolving faster than ever before. Read this dossier to find out more.
Tags : 
consumerization, byod, risk management, security, anti spam
    
HP - Enterprise
White Paper Published By: HP - Enterprise     Published Date: Jan 24, 2013
This eBook will help you to assess where you currently are in the security landscape, where you’re still unprotected and what you need to do complete your security portfolio.
Tags : 
security, network security, enterprise, infrastructure, best practices
    
HP - Enterprise
White Paper Published By: HP - Enterprise     Published Date: Jan 24, 2013
This eBook will help you to assess where you currently are in the security landscape, where you’re still unprotected and what you need to do complete your security portfolio.
Tags : 
security, compliance, mobile, tablets, byod
    
HP - Enterprise
White Paper Published By: HP - Enterprise     Published Date: Jan 24, 2013
This paper details risks to software deployed in the cloud and what steps to take to mitigate that risk.
Tags : 
cloud, security, attacks, risk, virtualization
    
HP - Enterprise
White Paper Published By: McAfee     Published Date: Jan 23, 2013
Stopping denial of service attacks is imperative for business continuity, but the complexities of these attacks makes protecting the service infrastructure that much harder. Read this white paper to understand why McAfee recommends an integrated and layered approach.
Tags : 
dos, ddos, attacks, threats, layered security
    
McAfee
White Paper Published By: McAfee     Published Date: Jan 23, 2013
A criminal industry develops. This paper explores bot evolution, it’s global prevalence, who’s at risk, a look forward and combating bots using Global Threat Intelligence.
Tags : 
botnets, bots, defense in depth, threat prevention, advanced attacks
    
McAfee
White Paper Published By: McAfee     Published Date: Jan 23, 2013
This paper discusses the six critical management capabilities of next-generation IPS solutions to help reduce operational overhead while unifying across multiple environments, streamlining security operations and protecting against targeted threats.
Tags : 
network security, intrusion prevention system, ips, anti spam, anti spyware
    
McAfee
White Paper Published By: McAfee     Published Date: Jan 23, 2013
Learn how McAfee Network Security Platform helps you realize greater consolidation benefits while minimizing project costs and disruption to your production environment.
Tags : 
network security, network consolidation, consolidation capabilities, anti spam, anti spyware
    
McAfee
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.